instruction
stringlengths
24
29.9k
What is positive wording for telling donors we no longer accept card information in writing, for their security?
I received one of those obvious fake "is this you?" and some fake Youtube link on Facebook Messenger. I don't know what it redirected to as I didn't click it (I only hovered over it to see if it was a legit Youtube URL, which it wasn't) Am I safe as I only read the message and didn't click the link or view it on any of...
I am Salesforce developer but new to the Security World as well as Linux. We encrypted a file with Key and initialization Vector in Salesforce(only symmetric encryption is possible in Salesforce). No we are working with partner team to decrypt the same in their linux system using gpg and OpenSSL. But we were not able ...
I found a file in my home directory named "sudo". It's 1.5GB in size and I have no idea where it came from. -rw-r--r-- 1 foo foo 1598296064 Aug 9 11:22 sudo Does anybody have any tips on how to proceed investigating this file? I fear that my computer may be compromised but I still want to know what I'm dealing with....
I am aware that you can do something like go to md5online.org or something, but I want to know how to do it manually. For example, you might encrypt it like by taking the length of it and turning the number to hexadecimal. I highly doubt that is how you do it, but that is just an example. I know it is impossible to dec...
I'm testing Android app which is vulnerable to HTML injection, but I'm having problem escalating it to a stored XSS vulnerability. I have tried these, and many more: <script>alert(1)</script> <iframe src="javascript:confirm(1)"> <a href="javascript:alert(1)">foo | linking to https://foo.com does not work also None of ...
Assuming I have the RSA forge (javascript) library, does the pure-RSA implementation work for information transferring? I know that the forge library has the keysystem and everything, but I want to know if this standalone RSA implementation is secure.
I just encounter an issue, the cached js files showed porn site Here's the simple network diagram. https://cdn.mysite.com/js/app.js shows a porn site, but if I add in query string https://cdn.mysite.com/js/app.js?t=20180928130702, then it displays the correct content The content in AWS S3 is correct. How does the att...
I'm a college student trying to complete the first part of a rather large project, but I'm new to TPM, and Linux. What I'm trying to do is have TPM handle automatic decryption of the root ext4 partition on the sd card upon boot. I have a Raspberry Pi 4 with Raspbian Buster installed. I've successfully encrypted the roo...
I'm trying to implement 2FA on my site, and cannot figure out how to generate and then securely store recovery tokens. From what I've seen, if for whatever reason you cannot MFA (lost your device maybe) you can use a recovery token as your second factor. I am concerned about storing them securely. On sites like Github ...
I'm curious whether there are standards or recommended best practices to protect network equipment that has to be left unattended and outside (of a secure data-center environment) for example for scientific research? The assumption here is that even a primitive station would have network equipment (at least a switch/r...
I'm developing an application that automates processes. The user connects to many accounts that the application uses then passwords are encrypted using AES. An example algorithm looks like this: When user add an account, password hash will generate AES(password, SHA1(accountLogin) + SHA1(accountPassword) + SHA1(pi...
I realized the issue a MITM proxy can pose to my privacy and I started to dig into it more to see how to detect it as a client. Things I know to check so far are: Checking who issues the certificate and see if it is a self-signed one installed in my own root certificate store. Checking if I am being served web conte...
I have a firmware project that uses asymmetric cryptography for assuring integrity and authority of updates. The private key is stored within the company, and the public key is on the firmware to validate the integrity and authenticity of an update attempt. Currently, the public key to be used for verifying the signatu...
I was just watching Michal Hrušecký's presentation about their open source routers. In the presentation he showed their "Honeypot as a Service" offering and how it allows you to see the passwords that were tried by attackers. How do they do that? Is it possible to log the password attempts on your linux server?
Wikipedia's article on WYSIWYS is very brief, and says: It is relatively easy to change the interpretation of a digital document by implementing changes on the computer system where the document is being processed I didn't understand this. Can someone show an example? Thanks!
We have a report that generates ~100 rows daily and our customers have to enter the data into third-party software. We hoped that the software allows some kind of data upload so that our customers don't have to do the tedious data-entry, but it's not happening. So, we are thinking to provide a solution to our customer ...
The normal threat model that I see with password hashing is as a kind of defense against if the hash somehow leaks to the wider world. In practice, this appears to usually be via some manner of database breach that ends up with (at least) the user table being dumped out. Given that this has happened or can happen, what...
I did search and found this post: Is it possible to identify mobile phone user with voice recognition It does not answer my question, however. Is there any way to alter a person's voice just enough to make the cell call unrecognizable with voice recognition techniques?
I used MitMproxy until recently I switched from the Samsung Galaxy S5 to the S9+ which runs Android 9... and suddenly I can't intercept apptraffic anymore. Looks like the proxy in the wifi-settings is ignored completely by apps? Aside from that I noticed apps using certificate-pinning and refused to work. Is there a so...
I just received a blackbox pentesting report where the security company recommended to hide the version number from the page (be it returned to the user as a text or used as a cache-buster in the css/js/img urls, like /path/to/file.css?v1.2.3. I gave it some thought and could not think of a good solution that would com...
Can anyone help me with the name of the digital footprint law? All I know is that it is named after its discoverer much like Moore's Law is. This is a computer science law that states for the purposes of encryption that all operations on a computer can be reversed which means that in theory all codes can be cracked. I ...
Normally, you would use a mail client for mail encryption. Though, I can access smartcard security functions from the browser for a secure login. Therefore, is it possible to decrypt Outlook Web App S/MIME messages using same client in a web browser like Chrome/Firefox? OS is Ubuntu Linux.
We will be creating a brand new application soon that handles online payments for our firm. We now have several different web applications (in different technologies) running that will all be integrated into our online payment system and we are thinking about how to secure against someone fooling the web app in thinkin...
The company I work in as an intern is using CA spoofing. When I check the certificate I have : Issued to : security.stackexchange.com Issued by : name of my company CA So here I'm sure that this is CA spoofing. It is the same on other websites as github, tensorflow ... My questions are : Is CA spoofing a common thi...
In many dictatorships SIM card cloning is used by the police (working together with the telco) to spy on dissidents, journalists etc. Some people say that you need the authentication key on the SIM card to clone it so that physical access to the card is a pre-requisite for cloning. ...
I want to block the view of the images and video in web and mobile app. For the web, I have managed access with WAF and added the API server as a trusted domain. But in the Mobile App, the header referral is empty and unable to match the WAF trusted domain policy. Anyone can suggest what is better to way to protect the...
Do world-writable systemd .service files created as symbolic links in /etc/systemd/system impose a security threat? Would it be possible to somehow modify the links to target arbitrary .service files on the system, and make systemd execute those files as root? The permissions for the /etc/systemd/system directory is as...
Typical computers with modern operating systems require log-on accounts with a user name and a password. Is it dangerous to reveal the user name of the log-on account to the public? My research: I have found these articles on Information Security Stack Exchange: Should usernames be kept secret? How bad is exposing val...
I copied the title from another question, but it wasn't answered there and my case is a bit different. I have inherited an old website to maintain. I noticed that the password hashing is not up to modern best practices, but I would like to understand if it is reasonably safe or needs changing. Here is the code that doe...
While testing a website i noticed that the value of parameter username is reflected inside the javascript code of the response. It's insert into a variable like this one: var valueUser = "my-controlled-value"; How can i trigger an alert box inside the javascript function? Here's what i tried. Tried to close the script...
A message authorization code is used in TLS to prevent man-in-the-middle-attacks that involve tampering with the contents of the packet in-flight. However, there is one specific attack which I don't see covered. At one stage of the TLS handshake, the client sends the server a private randomly generated proposed symmetr...
Sorry, kind of a long question. I am hoping that someone smarter about InfoSec than I am will read what I'm doing and give me guidance... Background My website allows psychiatrists to track their patient's mental health status. It does this by sending a periodic email to a patient, with a link back to a page on the web...
My dad received a suspicious email from our ISP (mtnl.net.in). The email was from noreply@mtnl.net.in and it had our user ID (I masked it as xxxxxxxx@a) in the email so it must have come from the ISP itself. Email details below: Subject: "Intimation Regarding Malware/ Virus Infected Systems" Body: Dear Sir/Madam, Gr...
I want to apply for a job as a penetration tester in a good company. I have a fairly good knowledge of programming and have experience as a back-end developer. I started to work with Burpsuite, ZAP, Metasploitable2, Juiceshop, and I've started to do some stuff locally. I want to gain more experience and do some challen...
Even though my firewall is active, is it protecting me fully given that the 'rules' are not active? Output shows: host based firewall active, empty rules iptables modules loaded, but no rules active Maybe I should mention that I recently changed the OS from ubuntu to debian. The firewall was probably made in relation ...
This seems like an obvious question, but I can't easily find a clear answer. I'm setting up a FreeRADIUS server on my LAN just for curiosity's sake, but I want to know if the packets are encrypted at all by default, and, if so, how? I know requests are sent with a shared secret that acts as a password. I would hope tha...
UPDATE: There is a similar question, but my question is different because it is very narrow and about a very specific security concern. In short, I used a laptop to make posts on a Russian social network (vk.com) from Japan and am now travelling to Russia with the same laptop. My specific concern is how I can exclude t...
I have symantec endpoint protection on my computer. I have the python script: import subprocess import os from ftplib import FTP os.chdir("public_html2") data=subprocess.check_output(["git", "diff","--name-only"]).decode("utf-8").split("\n") entries = [] for file in data: if file!="": entries.append(file.strip()) ...
I wish to check how and what is being sent when I interact with my TV via the remote that talks to the communicator box (not smart tv). I am curious what protocols are used, and how often does the communicator phones home. Does it send encrypted data or not. The ISP is also my TV network provider. To tackle this questi...
When assigning priority for a bug, we had an internal discussion whether in C++ deleting an object more than once can result in code execution if the pointer to object can be corrupted. For the objects having virtual destructor the answer seem to be obvious here. However what is not obvious whether this could be explo...
In comparison to keyloggers, mouse recorders do not seem to be able to obtain much sensitive information. For example, passwords, credit card numbers, email addresses, names, passport numbers, etc. can be obtained using keyloggers. But what about mouse loggers? What can mouse positions and mouse clicks reveal to a spy?...
I know that privacy is dead etc, but I saw a presentation (Link: https://www.youtube.com/watch?v=OTt1AVRQyx0 )about developers of Android apps using the Facebook SDK for whatever reason in their development of applications. I was stunned and angered by the amount of data that FaceBook exfiltrates from user systems. ...
I don't really trust the guy and i'm trying to take my time to learn everything about it, but what do you guys think? generate_ssl.sh #!/bin/bash name=ourwebdomain.local openssl req \ -new \ -newkey rsa:2048 \ -sha256 \ -days 3650 \ -nodes \ -x509 \ -keyout $name.key \ -out $name.crt \ -config <(cat ...
I occasionally get alerts from idnotify.com Dark Web Monitoring, such as this one: 08/31/2019 COMPROMISED EMAIL ADDRESS Email Addresses: Jt***an@gmail.com Date Found: 08/26/2019 Password ************************* Potential Site DUBSMASH.COM Immediately change the password for the email address that was found compr...
I am performing a security assessment against an application, i would like to recognize the encryption function used to generate the following hash PWYXFYNRWTYZ HVZPVPMBBFPB VXTCHXMHPKVH As shown above, the hashs are 12 byte alphabets Regards
I’m currently researching a possible security vulnerability I may have found on a well-known website. Before I present to the company, I’d like to build a proof of concept. I’m looking at a site (Site A) that has a form. The user picks a location from a list and then enters a number between 1 and 10. The form then retu...
I'm playing around with a self-xss bug that I believe I can escalate with a CSRF attack. However, the exploit relies on sending two identical Content-Length headers in a single POST request. Essentially, I'm looking for a piece of Javascript code that will make the visitor's browser issue a request that looks like thi...
Say I have a website that has the URL website.com/student/{studentId}/courses for retrieving all the courses a student is enrolled in. The studentId is an auto-incrementing value in the Student table I have in my database. Obviously I'm securing my API and returning back 403s if the user's current session doesn't match...
I am the TA for a coding class in which students will have to write Python 3 scripts to solve programming problems. An assignment consists of several problems, and for each problem the student is supposed to write a python program that will read input from standard input and write the output to the standard output. And...
Is it possible to detect the hash algorithm used to encrypt a file or partition with Veracrypt?
In a rather heated mailing list thread, I read some information provided by one of the developers of mozjemalloc, the memory allocator in Firefox that was forked from jemalloc, that stated that the fork has significant security improvements over regular insecure jemalloc. I've been out-of-the-loop on browser security f...
What are the considerations when picking the best password hashing algorithm in .NET Core? I read that not all hashing algorithms are compliant / unverified, so I am a hesitant on just getting various implementations from NuGet. Also, it is not recommended to create your own hashing algorithm as verifying it needs some...
OWASP defines "evil regex" (here) as follows: Evil Regexes A Regex is called "evil" if it can stuck on crafted input. Evil Regex pattern contains: Grouping with repetition Inside the repeated group: Repetition Alternation with overlapping Examples of Evil Pat...
This question is similar to this one, so let me elaborate what I'm struggling with. I want to get the length/strength of the key used by the server during the key exchange and authentication, i.e. public key size for RSA, prime field size for DHE and so on. So the way I understand it, the subject's public key and KeyUs...
We have an overview with known but fixed vulnerabilities for this browsers: Google Chrome, Mozilla Firefox and Internet Explorer. Such lists exist for many other browsers too. We also have such vulnerabilities which were never reported and also might be used for malicious purposes. I know that years ago 0days in flash ...
I would like to create a honeypot (bot) to hunt browser zero-days (and browser extensions). What is the best way to find those 0days automatically (I would like to create a sandboxed bot which would visit websites and check if they are trying to exploit browser vulnerability). I think that just to sandbox this bot and ...
I'm developing a PHP application (PHP 7.3) for my company, which will be hosted in our own servers. For now it will only be accessible from within the network but eventually will be opened to the web. The IT department is going to give me a "service" user whose password won't expire (so all the services for both the se...
I have my new website to be published (it's called buysteel.com). I will have thousands of clients visiting my site every month, and I would like to protect them around and at the site. Is it worth buying nonsense domains that just have the function to redirect them to the right domain? For example I could buy these do...
Im working on a small Custom Oauth2 Authorization Server. I want to send the Access Token in a http only Cookie to the client. According to 5.1 of the RFC6749 the token has to be in the entity-body of the HTTP Response in an "application/json" media type. Example HTTP/1.1 200 OK Content-Type: application/json;charset...
Recently, the facebook page changed on my computer (on others from the same router, I get the regular page). I checked the ssl certificate, and it seems to be authentic, however, as the page does not look professionally designed, I am worried it is a man in the middle attack. How to be sure if it is legitimate or not ?...
I've downloaded and installed NordVPN on Ubuntu and am a bit incredulous at its operation. After I downloaded its .deb file and installed it, apparently it can be activated with the command nordvpn connect, and I'm expected to believe that this command encrypts and reroutes all packets from my machine to go to their se...
I get the impression that it is a programming best practice to create variables in specific scopes (like a function scope) and avoid global scope to make things more modular and better organized. However I'm not sure if there is also a security issue. Here is an example of global variables in Bash that worked for me f...
I am looking for email providers with the following conditions for privacy. email providers that: Are free. Do not require JavaScript or other credentials for registration. Provide an onion service. Support PGP encryption and key management. Have encrypted inboxes by default. Are outside Fourteen Eyes jurisdictions --...
We have a Linux box (Ubuntu VERSION="18.04.2 LTS (Bionic Beaver)" that hosts MySQL. When I check the MySQL logs I see constant failed attempts to log in from root@localhost. does this imply that I have malware in the same box or some attacker can pretend to be the localhost?
I'm trying to insert javascript:alert(1) inside tag. There is some kind of filter for javascript, so I tried using javascrip%74:alert(1) and that url is accepted. However when i click on it it redirects me to https://www.website.com/javascript:alert(1) instead of showing the alert box? Why is that happening and how c...
SAML noob here, I have an idea implementing permission(authorization) outside of IdP, which effectively become a "Permission Service Provider", so say when an application (another service provider) that authenticate against the IdP via saml protocol, is there something the application could use in the saml response fr...
I have some server applications and from time to time I'm being victim of some attacks which might be of interest and I'm going to describe in the following. The most recent attack originated from 115.236.61.204 (China). The IP address was the last server log and my (C) accept function was "broken" after it. The server...
There's been some joking on the internet where a candidate would "hack their way into getting a job interview" and disclose that as a proof of skill in a job related to Infosec. If I somehow find a "hack", such as keywords in an ATS, bypassing application checkpoints, secretly putting my name in the "interview list", o...
I have employed strongSwan U5.5.1 for installing an IPsec tunnel between two Debian hosts with a firewall in between. My ipsec.conf specifies authby=secret but not ah=. The firewall currently permits ESP (protocol 50) and UDP/500 (ISAKMP), UDP/4500 (NAT-T), but not yet AH (protocol 51). My question is this: if I want t...
The library I am using (ASP.NET Identity) to generate multi-factor authentication (MFA) codes will produce the same code for a given user within a certain period of time. Therefore if the user requests multiple codes in quick succession they will receive the same code multiple times. From a security perspective, is thi...
In my organization, we have an SSL MITM (Man-in-the-middle) proxy (like ZScaler proxy). If I browse an HTTPS website and check the certificate, I can see that the proxy has issued a separate certificate for the site(means the original certificate chain is replaced). I am not getting any alert in my browser because I th...
I get this error when using snort -r to read a saved pcap file and apply snort rules on it. ERROR : pfring daq does not support read-file I am running snort in Security Onion I tried many things: sudo snort -i ens34 -c /etc/nsm/templates/snort/snort.conf -r pcap.pcap
This question is related to an earlier question I had: Encryption on Mobile Devices - Multiparty Encryption - Key Management My situation: I have many mobile devices that want to send sensitive information to different clients by passing by the back-office which stores this information for some time. As described in t...
I'm using an Internet plan of 100GB bandwidth monthly from my ISP, and I made a simple web crawler for fun and run it on my personal computer 24/7. The crawler is consuming all of the bandwidth, and I configured it to skip downloading media files (images, videos, sound files), so I can make as many requests and collect...
In wireless communication, data flows at various frequencies ranging from Radio to Satellite communication. These frequency carriers are allocated for different uses based on various requirement parameters such as distance, accuracy, the volume of data, and more. I am playing with cheaper RTL-SDR receiver to collect r...
What does this URL do that opens each time Google Chrome loads? http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx You can see an example of this in app.any.run below: https://app.any.run/tasks/8ba5fb73...
The aim is to detect, if anyone in the HOME_NET is searching for a particular term - say "terrorism" and generate an alert via a content based rule. I am using Snort 2.9 installed in a virtual machine (VirtualBox) running Ubuntu 18.04. This same qs was asked here but remains unanswered. For testing purpose, HOME_NET i...
Does anyone have pointers to a certain type of replay attack that I would call "data report" replay attacks, or past data injection attacks? In short, I am not talking about traditional network replay attacks where an attacker records traffic and repeats valid transmissions going through the network (e.g. for identity...
I am trying to understand how AWS KMS works, and there is one thing I am still not completely sure of: when using CMKs, so no Data Keys, no envelop encryption, does the encryption take place in the cloud? Maybe because it's so obvious that it happens in the cloud, but I haven't been able to find a clear answer anywhere...
We're using a load balancer, which implements TLS interception for a server, which in turn uses TLS Client authentication. Since TLS interception implies that the client will make the connection to the load balancer, not the server itself directly, will this affect the authentication process?
The source code of my website is on a server multiple people can access via FTP. How can I prevent them from accessing the source code? Edit: Ok, so I can't do nothing about that. But, how about if I can compress the script and to change with the original on FTP? (of course in my PC will not be compressed the code). Bu...
Maybe I'm missing something obvious here... The development landscape is littered with client-side WYSIWYG text editors (for example, TinyMCE), all of which seem to want to send raw HTML back to my server via something like a textarea. The obvious challenge with a scheme like this is that, even if the editor can be tru...
I have a network consisting of 2 VMs(Windows 7). VM1:- 192.168.56.101 VM2:- 192.168.56.102 Both are connected to vboxnet0 (192.168.56.1). I infected VM1 using WannaCry ransomware but the ransomware does not spread to VM2. I've disabled windows firewall&defender and can ping both VMs from each other and they are visible...
I'm trying to use overthewire narnia problems as a way to learn about binary exploitation and I'm getting different results than any of the walkthroughs I was looking at https://tuonilabs.wordpress.com/2017/05/13/overthewire-narnia-write-up/ for 'Level 2' and started off by used peda to create a pattern - I ran the pr...
I am writing a story that involves a cellphone being recovered at a crime scene. The police go through it and find all the non-deleted files and continue until a they do something to obtain the data that was recently deleted. I want to know how they would do this and what steps are necessary for it. I want to be realis...
I am testing a website with a password reset functionality that provides a link with a token like most websites. I asked for multiple password reset links to see any pattern in the tokens. All the tokens had 8 characters, all alphabetes capital and small, no numbers or special characters. Would you consider it a weak t...
I'm using rabbit-mq as the main communication method in my microservices. The names of each queue describe exactly what is the purpose of it. e.g "send-payment", "send-email" and so on. Should I consider giving a random name for each queue to improve the security?
What are common mechanisms to ensure that a device firmware is not only properly signed, but actually signed by the correct device manufacturer? In TLS communications, certificate pinning or public key pinning is used. But if I want to use a device configuration tool (Windows-based) to update a device firmware and want...
I need to store a key (symmetric-key cryptography) within my C++ application binary (based on OpenCV) so that the key as unidentifiable as possible. Can someone help me choose the key so that is secure and it will be difficult for an attacker to find the key in the binary? If I choose plain text (regardless of length) ...
I am doing a security course and a module on client side attacks, which is why this post might seem evil or outdated. I have a Java applet fetching a malicious jar file and trying to then download and execute a malicious binary on a Windows 7 host. When debugging the applet in Java Console I am getting the following er...
Is this script vulnerable to PHP or JS code injection? In my quick test I changed the useragent to a PHP script but it will not be executed just printed. If change the user agent to a javascript code I receive a connection refused by the webserver. So am I safe with this type of script? <?php $u=$_SERVER['HTTP_USER_AG...
I'm filling out tax information. The accountants out-source the survey collecting the tax info to another company. Seems fair enough - I'd rather have computer experts handle the technical implementation of my information's security than have tax accountants trying to do it. Problem is that when I pause work on inputti...
From what I understand: EAP-TTLS forces the RADIUS server to identify itself to a client with a certificate, but optionally a client to the server. All information about an end-user is encrypted through a tunnel. EAP-TLS forces the RADIUS server and the client to identify themselves with a certificate. The end-user's n...
I have a Sailsjs app that is configured to encrypt model attributes with sensitive information. This seems to use bcrypt, under the hood and leverages a JSON keyring in the configuration (environmental variable might work too). The docs imply that rotation requires me to SSH into each deployed instance and edit the key...
In my organization we have a cloud proxy that work on a loopback address. The vendor of this proxy has deployed an app on our machine which listens on the loopback address. I have captured the apps traffic with Wireshark. You can see it below: Also, I have captured traffic on the wifi interface or adapter as well, wh...
I know that you should never roll your own crypto, but I'm just implementing/combining(?) two highly trusted algorithms into Javascript First, I am using a bcrypt implementation that I did not code. Secondly, I can switch hashing algorithms if bcrypt is not suitable for an EtM approach. According to Wikipedia, EtM is: ...
Concept of Rings Rings were introduced in the forerunner of UNIX, Multics, and had 8 rings for reading, writing, executing and calling (I don't quite understand why it needed 8 rings to do this, if anybody does consider that a bonus question!). The x86 architecture by Intel incorporated the idea of rings into hardware...
Five years ago, an extremely similar question was asked: has scrypt withstood the test of time. Since this was asked five years ago and some of the responses were mixed, such as: "Scrypt has mostly survived." or "Everyone paying close attention to the Password Hashing Competition expects that Colin Percival will be sub...
I know that traditionally a malware signature is a pattern of bytes in a program. While reading Joxean Koret and Elias Bachaalany's "Antivirus Hacker's Handbook" I saw that the authors categorized the use of call-graphs and flow-graphs in malware detection as forms of signature-based detection. Is it accepted that cal...